Table of contents
Enhancing cyber security behavior: an internal social marketing approach
Hiep Cong Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat NguyenUnderstanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study…
The willingness to disclose personal information: Trade-off between privacy concerns and benefits
Ibrahim M. Al-Jabri, Mustafa I. Eid, Amer AbedCustomer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder…
Automated data-driven profiling: threats for group privacy
Paola Mavriki, Maria KarydaUser profiling with big data raises significant issues regarding privacy. Privacy studies typically focus on individual privacy; however, in the era of big data analytics, users…
Cloud computing in SMEs: towards delegation of the CIO role
Wafa BouaynayaThe purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several…
The hunt for computerized support in information security policy management: A literature review
Elham Rostami, Fredrik Karlsson, Ella KolkowskaThe purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…
What do we know about information security governance?: “From the basement to the boardroom”: towards digital security governance
Stef Schinagl, Abbas ShahimThis paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate…
Cybersecurity behaviour of smartphone users in India: an empirical analysis
Pintu Shah, Anuja AgarwalFor a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell